Lead2pass Offers Free 70-345 Dumps Files for Free Downloading By 70-345 Exam Expert:
You need to recommend a solution that meets the security requirements for the tablets.
Which two objects should you include in the recommendation? Each correct answer presents part of the solution.
A. a mobile device mailbox policy
B. an Outlook Web App policy
C. a data loss prevention (DLP) policy
D. a device access rule
Scenario: Users must be able to access Outlook on the web internally and externally from their tablet.
Users must be able to configure their tablet to synchronize email by using Autodiscover.
Users must be able to access their mailbox by using Exchange ActiveSync on the company-approved tablets only.
You have an Exchange Server 2016 organization. The organization contains five Mailbox servers. The servers are members of a database availability group (DAG).
All of the databases in the DAG are replicated to all of the members.
You plan to perform scheduled maintenance on a Mailbox server named MBX3 that will place the server offline for up to an hour.
You need to ensure that any active databases on MBX3 are activated on other DAG members before performing the maintenance.
Which cmdlet should you use?
You have an exchange server 2016 organization. The organization contains a Mailbox server named EX01. EX01 contains a mailbox database named DB01.
The volume that contains DB01 fails.
You need to perform a dial-tone recovery of the database.
What should you create first?
A. a new Recovery Storage Group
B. a new mailbox database
C. a mailbox move request
D. a mailbox restore request
E. a lagged database copy
You have an Exchange Server 2016 organization. The organization contains several servers.
Users in the marketing department often send Information Rights Management (IRM)- protected email messages. The IRM-protected messages are excluded from eDiscovery searches.
You need to configure the Exchange Server Organization to ensure that the contents of the mailboxes of the marketing department users are searched for all messages that contain the word ProjectX. The solution must prevent the email messages from being deleted permanently.
You user account is a member of the required role group.
Which three actions should you perform? Each correct answer present part of the solution.
A. Run theNew-Mailboxcmdlet
B. Run theNew-MailboxSearchcmdlet
C. Run theSet-IRMConfigurationcmdlet
E. Export the results from the discovery mailbox to a personal folders (PST) file, and then use MicrosoftOutlook to open the PST file.
F. Use Outlook on the web to open the discovery mailbox.
Drag and Drop Question
Your company has an Exchange Server 2016 organization.
The organization contains three servers and 2,000 mailboxes.
The organization audits all access to user mailboxes.
The company’s security policy has the following requirements:
– Audit the name of each administrator who modifies the Exchange Server organization settings.
– Reduce the amount of audit log information generated by a service account named Service!.
– Create an audit entry when an administrator modifies the permissions of another administrative mailbox.
You need to identify which PowerShell cmdlets must be used to meet the requirements.
Which PowerShell cmdlet should you identify for each requirement? To answer, drag the appropriate cmdlets to the correct requirements. Each cmdlet may be used once, more than once or not at all. You may need to drag the split bar between panes or scroll to view content.
Your company has an Exchange Server 2016 organization.
All users have a primary mailbox and archive mailboxes.
You create a new retention policy for the users. The policy includes the following types of tags:
A default retention policy tag (RPT) applied to the mailbox:
The tag is configured to move email messages older than three years to the archive. An RPT applied to the users’ Sent Items folder: The tag is configured to move email messages older than one year to the archive.
The corporate retention policy is applied to all of the mailboxes.
A user creates a personal tag named Tag1. The personal tag is configured to delete items permanently after 180 days.
The user sends an email message that uses Tag1.
You need to identify what will occur to the message. What should you identify?
A. The message will be deleted in six months.
B. The message will he moved to the archive in one year
C. The message will be moved to the archive in one year and deleted six months later.
D. The message will be moved to the archive in three years.
Personal tags allow your users to determine how long an item should be retained. For example, the mailbox can have a DPT to delete items in seven years, buta user can create an exception for items such as newsletters and automated notifications by applying a personal tag to delete them in three days.
You deploy a server named ex01 .contoso.com that has Exchange Server 2016 installed.
You need to ensure that when users connect to the URL of http://ex01.contoso.com. thev access Outlook on the web over a secure connection.
How should you configure the Default Web Site? To answer, select appropriate options in the selected area.
Your company has a data center. The data center contains a server that has Exchange Server 2016 and the Mailbox server role installed. Outlook anywhere clients connect to the Mailbox server by using the name outlook.contoso.com.
The company plans to open a second data center and to provision a database availability group (DAG) that spans both data centers.
You need to ensure that Outlook Anywhere clients can connect if one of the data centers becomes unavailable.
What should you add to DNS?
A. one A record
B. two TXT records
C. two SRV records
D. one MX record
70-345 dumps full version (PDF&VCE): https://www.lead2pass.com/70-345.html
Large amount of free 70-345 exam questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDTWpacmF1dlRwRFU